PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
vulners.com/securityvulns/securityvulns:doc:28238
vulners.com/securityvulns/securityvulns:doc:28239
vulners.com/securityvulns/securityvulns:doc:28240
vulners.com/securityvulns/securityvulns:doc:28241
vulners.com/securityvulns/securityvulns:doc:28242
vulners.com/securityvulns/securityvulns:doc:28243
vulners.com/securityvulns/securityvulns:doc:28244
vulners.com/securityvulns/securityvulns:doc:28245
vulners.com/securityvulns/securityvulns:doc:28246
vulners.com/securityvulns/securityvulns:doc:28247
vulners.com/securityvulns/securityvulns:doc:28248
vulners.com/securityvulns/securityvulns:doc:28249
vulners.com/securityvulns/securityvulns:doc:28250
vulners.com/securityvulns/securityvulns:doc:28251
vulners.com/securityvulns/securityvulns:doc:28252
vulners.com/securityvulns/securityvulns:doc:28253
vulners.com/securityvulns/securityvulns:doc:28254
vulners.com/securityvulns/securityvulns:doc:28255
vulners.com/securityvulns/securityvulns:doc:28256
vulners.com/securityvulns/securityvulns:doc:28257
vulners.com/securityvulns/securityvulns:doc:28258
vulners.com/securityvulns/securityvulns:doc:28259
vulners.com/securityvulns/securityvulns:doc:28260
vulners.com/securityvulns/securityvulns:doc:28261
vulners.com/securityvulns/securityvulns:doc:28262
vulners.com/securityvulns/securityvulns:doc:28267